CVE-2020-17440

Published: Dic 11, 2020 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2020-9393 Aliases: GSD-2020-17440
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,5
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high
MEDIUM 5,0
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: none
Integrity: none
Availability: partial

Description

AI Translation Available

An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. The code that parses incoming DNS packets does not validate that domain names present in the DNS responses have '\0' termination. This results in errors when calculating the offset of the pointer that jumps over domain name bytes in DNS response packets when a name lacks this termination, and eventually leads to dereferencing the pointer at an invalid/arbitrary address, within newdata() and parse_name() in resolv.c.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0058
Percentile
0,7th
Updated

EPSS Score Trend (Last 90 Days)

Application

Uip by Uip Project

cpe:2.3:a:uip_project:uip:1.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01
Third Party Advisory US Government Resource
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01
https://www.kb.cert.org/vuls/id/815128
Third Party Advisory US Government Resource
https://www.kb.cert.org/vuls/id/815128
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01
Third Party Advisory US Government Resource
https://us-cert.cisa.gov/ics/advisories/icsa-20-343-01
https://www.kb.cert.org/vuls/id/815128
Third Party Advisory US Government Resource
https://www.kb.cert.org/vuls/id/815128